Wednesday, September 16, 2020

Ethical and Social Issues in ICT - Computer Science - Grade X - New Syllabus

 


Ethical and Social Issues in ICT

 


The development of ICT has made possible to store large amount of data in the virtual world and make communication through it. At the same time, computer crimes and abuse of data, privacy violations, pornography are increasing.

 

Challenges of ICT

 

1.     Virtual Identity

a)     A major problem in the ICT environment.

b)     Internet criminals enter into the system by creating fake identities and use the system for their benefits which is difficult to recognize and control.

2.     Security

a)     Hacking or unauthorized access of system is increasing.

b)     Hackers are the greatest challenge for the ICT security personnel.

c)     Hackers hack others data and use for their benefits especially in banking and commercial sectors.

Privacy Issues

a)     Cyber bullying is a kind of harassment using mobiles or computers.

b)     Kind of harassment using electronic devices such as mobiles and computers.

c)     Sharing unnecessary information of individual or group of people is the danger of ICT in this era.

d)     Using internet many users bully others.

3.     Copyright

a)     A legal right that grants the creator of an original work.

b)     Because of it openness and easy access, through the internet, users can easily access the work of others and use them for the benefits without the permission of the creator.

4.     Social Behavior

a)     Excessive use of internet has changed the behavior of the people.

b)     Negative effects on sleep, work and academic achievements of the students.

c)     Usage of unethical sites has increased negative behaviors and crimes in society.

d)     Employees use internet at their workplace for non-productive works.

5.     Digital Divide

a)     The Digital Divide is a social issue referring to the differing (conflicting) amount of information between those who have access to the Internet (especially broadband access) and those who do not have access. 

b)     In education sector, developing countries have poor old education systems, so students will not be aware of new information technologies.

c)     In remote areas, they do not even have power, so information technology looks like computer cannot be used.

d)     To get ICT benefits, developing countries should train their human resource and also adopt new culture which is a bit costly.

 

Computer Ethics

Computer ethics can be defined as to follow the rules and regulation of computer technology and not to harm other computer users knowingly or unknowingly.

 

Major Provisions included in computer ethics are:

a)     You should not use a computer to harm other people.

b)     You should not search the file or record of other people.

c)     You should not spread false and illegal information.

d)     You should not destroy, erase or edit personal or group records.

e)     You should not use other people’s computer resources without authorization.

 

Cyber Law

v Cyber law refers to the laws regarding the internet and cyberspace which includes a wide variety of legal issues related to the use of communication technology.

v Cyber Law (also known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed on 30th Bhadra 2061 (15 September 2004).

 

The major components included in cyber law are:

a)     Electronic and Digital Signature Law

b)     Computer Crime / Cyber Crime Law

c)     Intellectual property Law

d)     Data Protection and Privacy Law

e)     Telecommunication Law

 

International Cyber Law

a)     Fair Credit Reporting Act in 1970

b)     Freedom of Act in 1970

c)     Federal Privacy Act in 1974

d)     Video Privacy Protection Act in 1988

e)     Copyright Act 1992

 

Digital Signature

A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and also ensure that the original content of the message or document that has been sent is unchanged.

It is necessary to keep the uniformity standard and guarantee in all the activities of the e-sector.

 

Cyber crime

Cyber crime is a crime committed by using cyber means/computer technology.

Cyber crime is also known as computer-related crime.

Illegal activities committed using computer technology

a)      Damage to computer and computer system.

b)     Acts to gain illegal access into the system.

c)      Use as weapons to commit other crimes.

d)     Acts against the provision of cyber law.

 

Examples of cyber/computer crimes

a)      Creating fake documents

b)     Blackmailing/social media abuse

c)      Distribution of pornography materials

d)     Piracy of intellectual properties

e)      Spreading computer viruses/malware

 

Digital citizenship

v A digital citizen is anyone who uses digital tools such as computers, cell phones, or the Internet. You can use these tools in your work, at school or for recreation.

v Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. 

v Digital citizenship applies to “those who use the Internet regularly and effectively,”

v Good digital citizenship engages young students and shows them how to connect with one another, empathize (understand) with each other, and create lasting relationships through digital tools.

v Bad digital citizenship, on the other hand, entails (involves) cyber bullying, irresponsible social media usage, and a general lack of knowledge about how to safely use the Internet.

Examples of Digital Citizenship

a)     Communicating with respect

b)     Respecting other’s privacy

c)     Adding helpful information/context to a discussion or wiki page

d)     Supporting others by offering useful feedback

e)     Encouraging them, or sharing work they’re proud of, etc.

 

Digital footprint

v A trace of data you create while using the Internet.

v Includes the websites you visit, emails you send, and information you submit to online services.

v Your online identity and individuality and is what makes you unique.

v It builds the online reputation, or impression depending on the things you do online.

v It is important to be aware of it because anything posted online is permanent and stays forever regardless of being deleted.

v Publishing a blog and posting social media updates are another popular ways to expand your digital footprint.

v  Every tweet you post on Twitter, every status update you publish on Face book, and every photo you share on Instagram contributes to your digital footprint.

v  The more you spend time on social networking websites, the larger your digital footprint will be.

v Even "liking" a page or a Face book post adds to your digital footprint, since the data is saved on Face book’s servers.

 

Types of digital footprints

a)     Active digital footprint

b)     Passive digital footprint

 

Active digital footprints

a)     An active digital footprint is where a user knows that they're sharing the information.

b)     Posting on Face book, Instagram, Snap chat, Twitter, and other social media platforms

c)     Filling out online forms, such as when signing up to receive emails or texts

d)     Agreeing to install cookies on your devices when prompted by the browser

 

Passive digital footprints

a)     A passive digital footprint is the information collected from a user without their knowledge.

b)     Websites that install cookies in your device without disclosing it to you

c)     Apps and websites that use geo location to pinpoint your location

d)     Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests

 

"Everything leaves a digital footprint. Whatever gets created may never go away. If they don’t want to see it tomorrow, they'd better not post it today"

 

IT Policy 2072

v IT Policy launch in Nepal – 2000 AD (2057 BS)

v Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

v Total laws in ICT policies 2015 (2072 BS) – 21 Policies

v Strategies in ICT policies 2015 (2072 BS) – 21 Strategies

v Percentage of the population will have digital skills by the end of 2020? – 75%

v Percentage of the population will be able to access the broadband services by 2020? – 90%

v Percentage of the population of Nepal will have internet access by 2020? – 100%

v  Percent of government services will be provided online by 2020? – 80%

 

Objectives of IT Policy 2000

a)     To establish knowledge based industry

b)     To increase employment

c)     To build knowledge based society

 

Vision of ICT Policy 2015

v To transform Nepal into information and knowledge based society and economy.

 

Mission of ICT Policy 2015

v To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal’s sustainable development and poverty reduction strategies.

 

Goals of Information and Communication Technology policy

 

a)     Nepal will strive towards enhancing overall national ICT readiness with the objective of being at least in the top second quartile of the international ICT development index and e-Government rankings by 2020.

b)     At least 75 percent of the population will have digital literacy skills by the end of 2020. 

c)     A universal broadband access to all people on an equitable basis will be in place. By 2020, 90 percent of the population will be able to access the broadband services.

d)     The role and significance of ICT industries and services (including telecom services) will  increase in the Nepali  economy with ICT value added (including digital content and  service industry) accounting for at least 7.5% percent of GDP by 2020.

e)     The jurisdiction of Nepal Telecommunications Authority will be expanded to secure  complete alignment with policy provisions outlined in this document. Along these lines, Nepal Telecommunications Authority will be renamed Nepal Communication Authority and its areas of operation restructured accordingly.

f)      By 2020, entire population of Nepal would have access to internet

g)     80% of all citizen facing government services would be offered on line by 2020

h)     e-Procurement will be promoted as means of driving transparency through government  procurement processes covering all public procurement of goods and services  irrespective of cost and volume of such procurements by 2018

i)      G2G implementation would be promoted with a view to achieving complete automation  of the operations of land administration, revenue administration and management, vital  registration, passport and citizenship certificate services by 2020.

j)      Broadband access will be expanded across the country with the goal of achieving a  broadband Internet user penetration rate of 30% at a minimum of 512kbps and making  available at least 10 Mbps download speed on demand in urban areas by 2018.

k)     Special funding arrangements will be developed and implemented within 2018 to support  innovation and incubation of on-line businesses and start-ups

 

Objectives of National Information and Communication Technology Policy

 

a)     To empower and facilitate Nepal’s participation in the Global Knowledge Society.

b)     To transform Government service delivery regime by promoting transparency, efficiency,  inclusiveness and participation through effective utilization of information and  communication technologies

c)     To promote ICT to further productivity among the sectors that is key drivers of the  national economy. 

d)     To create easily accessible, affordable and innovative  public access points under a  comprehensive eCommunity/ Village network initiative; 

e)     To deploy ICTs at all levels of Nepali educational system in order to improve educational outcomes while expanding access to education and training facilities 

f)      To facilitate the participation of youths and women in ICTs particularly in media and content development initiatives; 

g)     To promote the use of free and open source software as well as open standard in software development for government agencies 

h)     To  safeguard  public  sector  information  and  investment  against  negative impacts of deploying and using ICTs. 

i)      To improve communication systems across the country especially in areas of touristic interest to support tourism development in the country 

j)      To conserve natural resources and safeguard Nepal's heritage using ICT tools. 

 

 

Implementation of policy and strategy framework

 

A National Information and Communication Technology Policy Implementation Steering Committee will be formed at the Ministry of Information Technology and Communication with the following structure.

 

Hon. Minister, Ministry of Information and Communication Technology               Chairperson

Member, National Planning Commission                                                                  Member

Secretary, Ministry of Education                                                                               Member

Secretary, Ministry of Health                                                                                    Member

Secretary, Ministry of Agriculture                                                                            Member

Secretary, Ministry of Finance                                                                                  Member

Secretary, Ministry of Local Development                                                               Member

Secretary, Ministry of Information and Communication                                          Member

Chairman, Nepal Telecommunications Authority                                                     Member

 Representative Private Sector / Domain Expert                                                       2 Members

Joint-Secretary (Policy and Programme),

Ministry of Information and Communication                                                            Member-Secretary

 

The primary role of Information and Communication Technology Policy Implementation Steering Committee is to provide overall coordination support for the effective implementation of policy provisions along with monitoring and evaluation of policy interventions.

 

The Steering Committee will form an ICT Policy Implementation Sub-Committee comprising of representation from the stakeholder community and domain experts, including the private sector, to provide it with domain specific expert advice and recommendations in relation to the execution of policy provisions.

 

 

Electronic Transaction

v Transactions of electronic records data by using any types of electronic means.

v  Contains electric records and valid digital medium.

v  The exchange of all types of records which are in the form of electronic.

 

ETA (Electronic Transaction Act)

v ETA (Electronic Transaction Act) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime.

v It has made different requirements so that if anyone found having cybercrime, he/she will be punished according to the scene of the crime.

v He /she can be jailed for minimum from 6 months to a maximum of 3 years and has to pay the penalty according to the offense. 

v Maintaining privacy in the cyberspace, creating strong passwords, updating the security software, updating password are some of the techniques to keep secure him /her.

v The computer and cyber crimes such as hacking, piracy, copyright violation, fraudulent and all other deceitful activities have been clearly defined and punishments are set accordingly. The action against such crimes and punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000 in cash and six months to three years imprisonment.

v The new legislation has not only legalized all forms of electronic transactions and digital signatures but has also clearly spelled out ways to regulate various computer-based activities and punish cyber crimes.

 

When was Electronic transaction act 2063 authenticated and published in Nepal?

  December 8 2006 (22 Mangshir 2063)

 

Objectives of the Electronic Transaction Act 2063

a)     To make legal provision for authentication and regulation of electronic data.

b)     To make a reliable date generation, communication, and transmission.

c)     To make a secured and authentic means of electronic communication.

d)      To regulate all the relating matters of electronic transactions.

 

Scopes of the Electronic Transaction Act 2063

a)     Creation and use of digital signature

b)     Control cyber/computer-related crimes.

c)     Protection of intellectual property.

d)     Protection of confidentiality.

 

Social Media

v The 'social' part: refers to interacting with other people by sharing information with them and receiving information from them.

v The 'media' part: refers to an instrument of communication, like the internet (while TV, radio, and newspapers are examples of more traditional forms of media).

v Social media is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.

v By design, social media is internet-based and gives users quick electronic communication of content.

v Content includes personal information, documents, videos, and photos.

v Users engage with social media via computer, tablet or smart phone via web-based software or web application, often utilizing it for messaging.

 

Many Forms of Social Media

 

v Social media may take the form of a variety of tech-enabled activities. These activities include photo sharing, blogging, social gaming, social networks, video sharing, business networks, virtual worlds, reviews and much more.

v Even governments and politicians utilize social media to engage with constituents and voters.

v For individuals, social media is used to keep in touch with friends and extended family.

v Some people will use various social media applications to network career opportunities, find people across the globe with like interests, and share their thought, feelings, insight, and emotions. Those who engage in these activities are part of a virtual social network.

v For businesses, social media is an indispensable tool. Companies use the platform to find and engage with customers, drive sales through advertising and promotion, gauge (find)  consumer trends, and offering customer service or support.

 

 

Different platforms of Social media

a)      Facebook - Facebook is a free social networking Web platform that promotes and facilitates interaction between friends, family and colleagues. Facebook was founded in 2004 by Mark Zuckerberg and several Harvard University classmates.

b)     Twitter – Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets. Twitter was created in March 2006 by Jack DorseyNoah GlassBiz Stone, and Evan Williams, launched in July of that year.

c)      Instagram – Instagram is the name of an online photo sharing social Web service that lets you share your life with friends through a series of pictures captured with a mobile device. Instagram also supports video uploads.

The Instagram service, which claims to have more than 100 million users, was founded by Kevin Systrom and Mike Krieger in October, 2010. In April, 2012, Facebook acquired Instagram for $300 million in cash and 23 million shares of stock -- a total purchase value of nearly $1 billion.

d)     LinkedIn – LinkedIn is a social networking website designed for business professionals. It allows you to share work-related information with other users and keep an online list of professional contacts.

e)      Blogs – blog (shortening of “weblog”) is an online journal or informational website displaying information in the reverse chronological order, with the latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject.

f)      Wikipedia – Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians. Anyone registered on the site can create an article for publication; registration is not required to edit articles.

 

Opportunities of using social media

a)     People from anywhere can connect with anyone. Regardless of the location and religion.

b)     Millions of people are using social media platforms so it has a great opportunity to promote business.

c)     It is a very fast way of exchanging the information.

d)     You can share your ideas and views in a particular area of interest.

e)     It also creates awareness and innovates (introduce new) the way people live.

f)      Communication mechanism is very simple and easy.

 

Threats of using social media

a)     Personal data and privacy can be easily hacked and shared on the internet.

b)     More chances of creating fake accounts.

c)     Create health problems.

d)     Decrease the working efficiency of people.

e)     More chances of spreading unnecessary rumor soon.

f)      It can easily collapse someone’s reputation just by creating a false story and spreading across the social media.

 

***


5 comments: